But in a video posted to YouTube, Positive Technologies researcher Timur Yunusov demonstrated how a long press of the touch screen ATM -- which simulated a right click in Windows -- exploited software flaws in the machines' operating system.

In the footage, Yunusov appears to conduct a regular transaction on the targeted ATM showing that it functions normally.

He extracts cash, then long-presses the screen triggering a Windows context menu. From there Internet Explorer appears and he executes via the browser the on screen keyboard and then opens the command function.

In a following video set to the tune Zero Day he again withdraws cash then runs "creditcardsearcher" which pulled PANs and expiry dates. Next he runs the game Angry Birds Space and proceeds to play.

In a post (translated from Russian to English) head of technologies Dmitry Evteev said the company would not yet release more details on the attack "without coordination with system manufacturers" citing principles of responsible disclosure.

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.Your use of this website
constitutes acceptance of nextmedia's Privacy Policy and
Terms & Conditions.